You are on page 1of 5

International Journal of Engineering Trends and Applications (IJETA) – Volume 5 Issue 3, May-Jun 2018

RESEARCH ARTICLE OPEN ACCESS

A Systematic Review on Intrusion Detection Systems for


Mobile Devices
Bhavkanwal Kaur [1], Puspendra Kumar Pateriya [2]
School of Computer Science and Engineering
Lovely Professional University
Jalandhar-144402
India
ABSTRACT
In the recent years the use of mobile devices has increased drastically, so does the security concerns associated with it. To deal
with the security threats to the mobile devices, many applications came into existence like firewall, Anti-virus. But in many
cases these also fail to provide security in case of severe attack being done by an intruder. So more secure systems were
introduced, which are known as Intrusion Detection Systems (IDS). In the beginning traditional IDSs were introduced which
were in providing security to the devices which are static inside a particular network and do not change their networks but these
IDSs failed to provide security to the mobile devices. So in order to provide security to the mobile devices, mobile Intrusion
Detection Systems were introduced. In this paper we have surveyed the different existing mobile IDS and their advantages and
limitations.
Keywords:- Intrusion Detection System, mobile IDS, traditional IDS

I. INTRODUCTION network packets because of high traffic during congestion.IDS


Intrusion Detection System is the system which oversees the are generally constructed in two ways, Active and Passive.
every packet passing through either a network or a particular When an IDS just the sense the activity and maintains the log
device and checks for the intrusive patterns in it.[1] In the information about it , then it is a passive IDS but if
beginning we had only traditional IDS which were usually along with doing all this, it also gives response to the attack
deployed at the gateway of a particular network to keep an eye done, then it is a active IDS.
on all the ingoing and the outgoing traffic. Every packet passing
The services provided by traditional IDS are not able to do
through it should satisfy the predefined pattern and if not, the
detection for mobile devices. Nowadays, there are broad
packet is either dropped or blocked. IDS is mainly
range of services provided by mobile devices over numerous
categorized into two types, Host based Intrusion Detection
network connections and is able to reserve a large amounts
System(HIDS) and Network based Intrusion Detection
of private to professional data. So, these days use of mobile
System(NIDS). Host based IDS is installed on one particular
devices are at its peak. The usage can vary from exchanging
host, means on one device only. It basically observe and
pictures via blue-tooth to sharing a crucial information
supervise the insides of the data processing machine as well
through mail exchange. Although mobile devices are most
as the information packets present on its network
reliable for communication, they are most susceptible to
interfaces. Network based Intrusion Detection System is
attacks. The physically possible attacks that could be done
distinct from HIDS as in NIDS it monitors the whole of
on a mobile device is either someone can steal a mobile
network traffic which means that the traffic from all the
device or cloning of the SIM card. In software based attacks,
devices a particular network. As like HIDS, it matches the new
Malware attacks like viruses, worms, key-loggers are the
pattern of the traffic with the old one to detect anomalies.
most common attacks on the mobile devices. In order to
Whenever it finds an attack it, an alarm is generated. It also
provide protection against such attacks various schemes were
maintain log files and check patterns due to which the system
designed like anti-virus, biometrics, encryption and firewall.
is being compromised. IDS is not the solution to all security
In the late 90s, there were techniques available to provide
issues, there are many issues in which it fails to provide
protection against traditional attacks only. Later, research
security. Consider that the network is very much congested, in
extended to providing protection against battery based
that case IDS will not be able to keep a watch on all the
attacks, mobile agent based attacks. But these existing IDS

ISSN: 2393-9516 www.ijetajournal.org Page 101


International Journal of Engineering Trends and Applications (IJETA) – Volume 5 Issue 3, May-Jun 2018

were able to encounter only a single vulnerability like have different types of mobile devices like smart phones,
battery based IDS can only identify attacks done on the laptops, personal digital assistants and many more. The
battery of the device.[2] So none of these devices were able operation of this IDS is make the mobile agent to visit each and
to provide protection against multiple attacks. every mobile device in the network by traversing from one
device to another and collect all mischievous activities from all
In this paper, we present a brief discussion on mobile IDS, devices. This IDS system is good for devices with low
their distinct types, how they perform their task in doing processing power. On the other hand determining a threat on a
detection, their pros and cons. particular node in the network will contribute in protecting the
whole of the network from a security attack. This scheme was
II. MOBILE IDS
proposed by Kannadiga in 2005.[6] But it has various
The main features of a mobile device are: it is able to limitations. In this signatures are created by performing
access different networks, low memory and lower malicious exercises on static nodes. So this is more suitable for
processing power and distinct group of services. The existing a particular host than for a device which is dynamic in
IDS are not compatible with the mobile devices.[3] nature. Since mobile devices move from one node to another, it
Network based IDS monitor the traffic of a particular provides no more protection to the device when the device
network but a mobile device is the one which roam in leaves a particular network. Thus it fails to provide
different networks. In case of Host based IDS , they are too protection against malware attacks.
hard to be managed by mobile devices. The first attack ever
happened on a mobile device was ”telephony service fraud” Battery Based Mobile IDS
which occurred in 1995 Battery is the lifeline of every electronic device and
.[4] This attack refers to theft of a mobile device or cloning we need good battery power to keep the system working
of the SIM card. Then the attacker can enjoy all the services efficiently. Now if the system does not have much power to
provided by the original SIM card. He can see all your SIM execute various processes on time, it may lead to loss of the
data and information like files, messages and can also make information and can even cause the device to stop various
calls, use Internet but the all the bill has to be paid by the services. And the attacker makes the use of this limitation.
original user. Until the user does not get any notification, The attacker may perform an attack by draining the battery
he is unaware of the fact that his card has been cloned.The of the system as a result various services of the device may
major concern is this attack can be used by a criminal or an stop.
attacker to make a contact to its other parties without being
traced. Generally, sleep deprivation attacks are performed on the
battery of the device which leads to the exhaustion of the
By the time an improvement was made in the features of
battery power.[7] Such attacks make battery of the device to
the mobile devices like increase in the processing power, as
get drained out faster than it what would be with the normal
a result email services became feasible and large data files
consumption. The attacker usually makes best efforts such
can be stored or exchanged but increase in facilities also
that the battery do not get a chance to enter the power saving
increased the security threats to these mobile devices such as
mode and make the battery to exhaust completely by keeping
DOS attacks, information disclosure and malware attacks.
it busy. The attacker can use three strategies to do that:
III. SIGNATURE BASED DETECTION IN
MOBILE IDS 1) Malignant power attacks
Signature based detection in mobile IDS is used to encounter 2) Benign power attacks
malware or DOS attacks. The work in this field began in 3) Service Request attacks
2000. It si basically classified into two classes, mobile agent
based mobile IDS and battery based mobile IDS.[5] In malicious power attacks, the attacker makes the processor
to consume more power than it’s actual consumption. In
benign power attacks, the processor is made to execute a
A. Mobile Agent Based Mobile IDS genuine or authenticated job but the job is of very high
This is generally developed for ubiquitous computing power consumption. Such tasks are given to the processor
surroundings, means those surroundings in which we can repeatedly, as a result the power of the battery drains out.

ISSN: 2393-9516 www.ijetajournal.org Page 102


International Journal of Engineering Trends and Applications (IJETA) – Volume 5 Issue 3, May-Jun 2018

In service request attack, the victim is asked for providing which are most commonly taken the person who owns the
services repeatedly over a network. Now even if device may mobile device and which are the most favorite routes of that
not provide the services but still it will consume power in person. It stores these patterns as the valid routes taken by the
deciding whether to provide services or not. person. Now, if the mobile device of the person got stolen then,
the thief will take a completely different route and it is an
To tackle, these attacks done on the battery, three proposals attack detected by the IDS.[10] This scheme still have a lot of
were made: Gibraltar, Battery Based Intrusion Detection limitations like it is not able to detect any malware or attacks
Model and Power Secure Architecture. All of these have related to the data. It is not able to detect any attack if the
almost the same working principle. As we know that the person is walking who is carrying a mobile device. It only
consuming power of each device is different, so the pattern detects when the person is traveling in any vehicle.
of attacks performed on each device will also be different.[8],
[9] So on each of the device the patterns of battery IDS system which is made for detecting telephony based
consumption are recognized and signatures are constructed attack, checks the calling data of the user, both incoming and
according to that. The signatures of every device would be outing. It checks out the date of the call made, its start time and
different. Now, the IDS system constantly keep an eye on all end time, the number on which the call is being made in order
the activities of the battery of the device and compares it with to detect any fraud, cloning of the SIM card or when the
the signatures in order to detect the intrusions. However this mobile device got stolen. By collecting all this information,
is a good scheme to detect the malware attack but detection certain records are maintained which contains the patterns of
of a malware signature is not an easy task. most called numbers , calling duration and timings. A
particular threshold is maintained up to which a deviation
IV. BEHAVIOR BASED MOBILE IDS from such patterns is acceptable. But if the deviation very
There are many facilities being provided by the mobile much abrupt and is greater than the threshold then it is an
devices but the way people use these facilities is quite attack. There are many type of telephony based mobile IDS,
different. Every service provided by the mobile device is like Stormann, Notare, which are based on supervised learning
used in a completely different way by every person, so the while devices like Samfat and Molva are based on
pattern of the attack made on any particular mobile device unsupervised learning. These are really a good IDS system
vary from person to person. Behavior based mobile IDSs are because it generates very less false positives. But the major
are mostly used for detecting telephony fraud, cloning of the drawback is, it is only based on detecting telephony based
SIM card or device being stolen or lost. Behavior based IDS attacks and provide no detection against any other type of
are all network based because the performance of particular network based attacks. Also they cannot detect malware or
device is observed by the service providers of the network. attacks related to the data. This IDS system is generally
operated by the network service provider, so there is o
These are generally categorized into three groups: responsibility of the mobile device.[11]

1) Migration Itinerary Based Mobile IDS Since the mobile device travels from one network to another it
2) Telephony Based Mobile IDS is very much prone to the migration based attacks. Migration
3) Migration Mobility Based Mobile IDS mobility based IDS was designed to provide attack detection
services when a device migrates from one cell to another.
Migration Itinerary based mobile IDS is used to detect Its is almost similar to the migration itinerary based mobile
traditional attacks happening on the system when a system IDS.It also maintains a particular threshold, when a particular
migrates from one network to another. This does not keep a task crosses that threshold, it is an attack. Various mobility
check on the activity of the mobile device within a particular based IDS were developed which give the best performance,
network rather it keeps a check on the device from the with almost 95 percent accuracy and 5 percent false positives.
network cell, from where it started the journey to the end There is one such system mentioned in [12], which even
of the destination. So, basically it observes the patterns that keeps a check on the patterns of the user on the working
the mobile device routes through the different networks and days and weekends along with accuracy.But again, the major
maintains a database of all the routes that the device takes. drawback is t only detects the attack when the user is traveling
It checks the patterns and sees that which are the routes at the speed of at least 60 miles in one hour. If the person is

ISSN: 2393-9516 www.ijetajournal.org Page 103


International Journal of Engineering Trends and Applications (IJETA) – Volume 5 Issue 3, May-Jun 2018

on foot, then the attack pattern is undetectable. But it is very


beneficial for the people who are regular travelers.

V. CONCLUSION AND FUTURE SCOPE


This paper is all about a small review on the types pf
mobile IDS available. Here we discussed about the
advantages and the limitations of the behavior and signature
based mobile IDS.Currently available IDS are not able to
provide detection over a wide range. We need devices which
can detect patterns over larger area and were able to control
malware or data related attacks.

REFERENCES

[1] H.-J. Liao, C.-H. R. Lin, Y.-C. Lin, and K.-Y. Tung,
“Intrusion detection system: A comprehensive review,”
Journal of Network and Computer Applications, vol. 36,
no. 1, pp. 16–24, 2013.
[2] D. C. Nash, T. L. Martin, D. S. Ha, and M. S.
Hsiao, “Towards an intrusion detection system for
battery exhaustion attacks on mo- bile computing
devices,” in Pervasive Computing and Communications
Workshops, 2005. PerCom 2005 Workshops. Third IEEE
International Conference on. IEEE, 2005, pp. 141–145.
[3] D. Michalopoulos and N. Clarke, “Intrusion detection
system for mobile devices,” Advances in Networks,
Computing and Communications 4, p. 205.
[4] F. Li, N. Clarke, M. Papadaki, and P. Dowland,
“Behaviour profiling on mobile devices,” in Emerging
Security Technologies (EST), 2010 International
Conference on. IEEE, 2010, pp. 77–82.
[5] H. Wu, S. Schwab, and R. L. Peckham, “Signature based
network intru- sion detection system and method,” Sep.
9 2008, uS Patent 7,424,744.
[6] P. Kannadiga, M. Zulkernine, and S. I. Ahamed,
“Towards an intrusion detection system for pervasive
computing environments,” in Information Technology:
Coding and Computing, 2005. ITCC 2005. International
Conference on, vol. 2. IEEE, 2005, pp. 277–282.

ISSN: 2393-9516 www.ijetajournal.org Page 104


International Journal of Engineering Trends and Applications (IJETA) – Volume 5 Issue 3, May-Jun 2018

[7] T. Martin, M. Hsiao, D. Ha, and J. Krishnaswami, “Denial-of-service


attacks on battery-powered mobile computers,” in Pervasive Computing
and Communications, 2004. PerCom 2004. Proceedings of the Second
IEEE Annual Conference on. IEEE, 2004, pp. 309–318.
[8] G. A. Jacoby, T. Hickman, S. P. Warders, B. Griffin, A. Darensburg,
and D. E. Castle, “Gibraltar a mobile host-based intrusion protection
system,” 2006.
[9] G. A. Jacoby, R. Marchany, and N. Davis, “Battery-based intrusion
detection a first line of defense,” in Information Assurance Workshop,
2004. Proceedings from the Fifth Annual IEEE SMC. IEEE, 2004, pp.
272–279.
[10] J. Hall, M. Barbeau, and E. Kranakis, “Anomaly-based intrusion
detection using mobility profiles of public transportation users,” in
Wireless And Mobile Computing, Networking And Communications,
2005.(WiMob’2005), IEEE International Conference on, vol. 2. IEEE,
2005, pp. 17–24.
[11] Y. Moreau, H. Verrelst, and J. Vandewalle, “Detection of mobile
phone fraud using supervised neural networks: A first prototype,”
Artificial Neural NetworksICANN’97, pp. 1065–1070, 1997.
[12] B. Sun, Z. Chen, R. Wang, F. Yu, and V. C. Leung, “Towards
adaptive anomaly detection in cellular mobile networks,” in Consumer
Commu- nications and Networking Conference, 2006. CCNC 2006. 3rd
IEEE, vol. 2. IEEE, 2006, pp. 666–670.
[13]

ISSN: 2393-9516 www.ijetajournal.org Page 105

You might also like